Common network devices (NICs, hubs, switches, bridges)
Wi-Fi and Bluetooth
Cloud computing
Intranets, extranets and the internet
LANs, WLANs and WANs
Network issues and communication
Security (including passwords, types of authentication)
Anti-malware
Electronicconferencing
Network
Connects computers and other digitaldevicestogether and allows them to sharedata and resources
Example uses of networks
Computer to computercommunication
Computer to devices such as printer, mice and keyboards
Mobile phone network
Smarttelevisions
Tablets and media playersdownloadingvideos and music and playing them through external devices such as speakers and digital projectors
Largest network
The internet
Common network devices and terms
Network interface card (NIC)
Media access control (MAC) address
Internet protocol (IP) address
Data packet
Network interface card (NIC)
Allows a device to connect to a network by turningbinary data into an electrical signal
MAC address
Uniquely identifies a device when it is connected to a network
IP address
Identifies the location of a device on a network
IP address versions
IPv4
IPv6
IPv4
32-bit address written as four groups of eightbits in denaryformat
IPv6
128-bit address written as eight groups of hexadecimaldigits
Data packets
Data is moved around networks in the form of data packets which contain information like sender's IP address, receiver's IP address, sequence/identity number, packet size, and number of packets in the message
Hubs
Hardware devices that connect multiple devicestogether to form a LAN, broadcasting datapackets to all connected devices
Switches
Intelligent versions of hubs that storeMAC addresses and direct data packets to the correctdestinationdevice
Differences between hubs and switches
Both use data packets
Hubs broadcast packets to all devices, switches send to specific device
Security is lower with hubs than switches
Switches use MAC addresses to locatedestination device
Bridges
Devices that connectoneLAN to anotherLAN using the same protocol, allowing them to function as a single LAN
Routers
Used to route data packets from one network to another based on IPaddresses, joining a LAN to the internet
How a router works
Receivesdatapacket, inspects IP address, routes to local network or transmits to external network based on routing table
Routing table
Contains information about the router's immediate network and other nearby routers, allowing it to determine where to send data packets.
Bluetooth
Sends and receivesradio waves in 79different frequency channels, automatically detecting and connectingdevices while avoiding interference
Wi-Fi
Sends and receivesradio waves in 2.4GHz and 5 GHz frequency bands, offering faster datatransfer rates, betterrange, and better security than Bluetooth
Cloud computing (storage)
Method of data storage where data is stored on remote servers in multiple locations for redundancy, allowing clients to accessdata at anytime
WPAN
Wireless personalareanetwork
Wi-Fi
Sends and receivesradio waves in several different frequency bands - 2.4GHz and 5GHz are the most common
Each band is further split into channels
The 5GHz band has a faster data transfer rate but a shorter signal range
Offers much fasterdatatransfer rates, better range and better security than Bluetooth
Wi-Fi-enabled device
A computer or smartphone that can access the internet wirelessly at any access point (AP) or 'hot spot' up to 100metres away
Cloudcomputing
A method of data storage where data is stored on remoteservers - there may be thousandsof servers in many different locations
The samedata is stored on more than one server in case of maintenance or repair, allowingclients to access data at any time
The physical environment of the cloud servers is owned and managed by a hosting company
Cloud storage
Instead of, or in addition to, saving data on a local hard disk or other storage device, a user can save their data 'in the cloud'
Cloud storage systems
Public cloud - customer/client and cloud storage provider are different companies
Private cloud - storage provided by a dedicated environment behind a company firewall; customer/client and cloud storage provider are integrated and operate as a single entity
Hybrid cloud - combination of public and privatecloud; some data resides in the privatecloud and less-sensitive/less-commercialdata can be accessed from a public cloud storage provider
Companies that transfer vast amounts of confidential data from their own systems to a cloud service provider are potentially relinquishing control of their own data security
There is a risk that important and irreplaceable data could be lost from cloud storage facilities
Actions from hackers (gaining access to accounts or pharmingattacks, for example) could lead to loss or corruption of data
Users need to be certain that sufficientsafeguards exist to overcome these potentially very harmfulrisks
In 2019, there were a number of breaches of cloud security
Pharming attacks
Redirects internet users to a fake or malicious website set up by, for example, a hacker; redirection from a legitimate website to the fake website can be done using DNS cache poisoning
The creator of the malicious code can gainpersonal data, such as bank details, from the user
Often the website appears to come from a trusted source and can lead to fraud and identity theft
Network types
Localarea network (LAN)
Wirelesslocal area network (WLAN)
Widearea network (WAN)
If a number of LANs are joined together using a router, then they can form a WAN
The network of ATMs (automated teller machines) used by banks is one of the most common examples of the use of a WAN
WANs usually make use of some public communications network (such as telephone lines or satellites), but they can use dedicated or leased communication lines, which can be lessexpensive